1. IT-Security >
  2. Cyber Security Nachrichten


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese
Anzeige

Nachrichten


Suchen

Offensity: “White-Hat-Hacker” von A1 hacken karriere.at

IT Security Nachrichten vom 17.12.2018 um 14:52 Uhr | Quelle google.com
Hier bleibt in vielen Fällen nur die einzige Möglichkeit, die IT-Security outzusourcen. Neben zahlreichen Softwarelösungen, die vor potentiellen ...
Newsbewertung

Weiterlesen

iTunes-Update legt Browser lahm: Apple macht erstmal einen Rückzieher

IT Security Nachrichten vom 17.12.2018 um 14:49 Uhr | Quelle winfuture.de
Apple, Fehler, App Store, Mac App Store, Fehlermeldung Auch Apple muss mal wieder ein Software-Update zurückziehen, das nach der Auslieferung für Probleme gesorgt hat: iTunes 12.8.1 war dafür vorgesehen, einen Fehler mit AirPlay zu beheben, hat aber bei alten macOS-Versionen den Browser Safari komplett lahmgelegt. (Weiter lesen)
Newsbewertung

Weiterlesen

How to Block Automatic App Updates on Windows 10 19H1

IT Security Nachrichten vom 17.12.2018 um 14:47 Uhr | Quelle news.softpedia.com
It may sound awkward for some users, but there are actually quite a lot of Windows 10 adopters out there who install Microsoft Store apps and use them on a daily basis. While I’m not one of them, mostly because the programs that I use every day haven’t yet landed in the Microsoft Store, I can see why some people migrated to modern apps. One of the reasons is that the applications installed here can be automatically updated whenever developers publish new versions, so it’s basically a lot easier to always stay up-to-date. Of course, there are third-party programs that come with their own built-in auto-update engine, like browsers, but overall, keeping Microsoft Store always updated is an effortless task. On the other hand, there are users who don’t necessarily want to update to the latest versions of each app because of various reasons. And one of them is that they don’t want to be the ones testing the reliability of app updates, especially because there were times...
Newsbewertung

Weiterlesen

Facebook API Bug Exposes 6.8M Users’ Photos to Developers

IT Security Nachrichten vom 17.12.2018 um 14:45 Uhr | Quelle informationsecuritybuzz.com

News is breaking that Facebook has exposed the private photos of an estimated 6.8 million users, due to an API bug. The bug allowed access to photos beyond the third-party app request, pulling their timeline photos, Facebook Stories, Marketplace photos, in addition to photos they’d uploaded to Facebook but never shared. Facebook says the bug …

The ISBuzz Post: This Post Facebook API Bug Exposes 6.8M Users’ Photos to Developers appeared first on Information Security Buzz.


Newsbewertung

Weiterlesen

Diese Gefahren lauern im Gesundheitswesen

IT Security Nachrichten vom 17.12.2018 um 14:30 Uhr | Quelle google.com
IT-Administratoren müssen deshalb neue Netzwerk-Security-Protokolle entwickeln, um die steigende Zahl von ungesicherten und oftmals mobilen ...
Newsbewertung

Weiterlesen

Diese Gefahren lauern im Gesundheitswesen

IT Security Nachrichten vom 17.12.2018 um 14:30 Uhr | Quelle google.com
IT-Administratoren müssen deshalb neue Netzwerk-Security-Protokolle entwickeln, um die steigende Zahl von ungesicherten und oftmals mobilen ...
Newsbewertung

Weiterlesen

Was ist Ransomware?

IT Security Nachrichten vom 17.12.2018 um 14:30 Uhr | Quelle security-insider.de
Ransomware ist eine Schadsoftware, die die Nutzung von Rechnern oder Daten blockiert und für die Freigabe ein Lösegeld fordert. Es kommen Methoden wie die Verschlüsselung von Dateien zum Einsatz. Bekannte Beispiele für diese Art von Malware sind CryptoLocker, WannaCry oder Locky.
Newsbewertung

Weiterlesen

This is on you, makers of sites and services that allow users to create passwords like “password.” you can do better!

IT Security Nachrichten vom 17.12.2018 um 14:21 Uhr | Quelle reddit.com
This is on you, makers of sites and services that allow users to create passwords like “password.” you can do better! submitted by /u/RonaldvanderMeer
[link] [comments]

Newsbewertung

Weiterlesen

"Magellan"-Lücke in SQLite bedroht Software von Apple, Google & Co.

IT Security Nachrichten vom 17.12.2018 um 14:21 Uhr | Quelle heise.de
Die Programmbibliothek SQLite und Chromium sind offenbar angreifbar und machen somit zahlreiche Anwendungen und Software verwundbar.
Newsbewertung

Weiterlesen

Kopf-an-Kopf-Rennen

IT Security Nachrichten vom 17.12.2018 um 14:18 Uhr | Quelle google.com
KI wird für verbesserte Sicherheitslösungen sorgen – aber auch für neue Angriffsszenarien. Dadurch erhält der Wettlauf um die IT-Security eine neue ...
Newsbewertung

Weiterlesen

Security Patching Docker Containers

IT Security Nachrichten vom 17.12.2018 um 14:18 Uhr | Quelle reddit.com
Security Patching Docker Containers submitted by /u/Charlie-B
[link] [comments]

Newsbewertung

Weiterlesen

Schnelle Bescherung: Telekom schaltet 264 Vectoring-Regionen frei

IT Security Nachrichten vom 17.12.2018 um 14:18 Uhr | Quelle winfuture.de
Logo, Deutsche Telekom, Telekom, Flagge, Telekommunikationsunternehmen Die Deutsche Telekom hat heute bezüglich des weiteren Breitband-Ausbaus mit Vectoring-Technik in die Fläche Vollzug gemeldet. Wie das Unternehmen mitteilte, könnten ab heute zahlreiche Haushalte in 264 zusätzlichen Kommunen Internet-Anbindungen mit bis zu 100 Megabit pro Sekunde im Downstream buchen. (Weiter lesen)
Newsbewertung

Weiterlesen

How to Change the Default Tab in Task Manager in Windows 10 19H1

IT Security Nachrichten vom 17.12.2018 um 14:06 Uhr | Quelle news.softpedia.com
Believe it or not, but the built-in Task Manager remains one of the most popular tools in Windows 10, and unsurprisingly, Microsoft keeps improving it with every new feature update. As many power users know already, there are lots of third-party applications out there that can provide you with an even more detailed set of data about your system’s hardware and software components. But despite these, the Task Manager still serves as the best option to gain access to the essential information regarding the running processes and the real-time performance of the system. And Microsoft knows this very well, so the upcoming Windows 10 19H1 introduces a new useful feature that will make it easier for users to find the information they access the most by simply opening Task Manager. As you know already, Task Manager displays data in a tab-based interface, with sections like processes, performance, app history, startup, users, details, and services. Whenever you launch the...
Newsbewertung

Weiterlesen

Taylor Swift Used Facial Recognition Tech At Concerts To Spy On Stalkers

IT Security Nachrichten vom 17.12.2018 um 14:00 Uhr | Quelle yro.slashdot.org
AmiMoJo shares a report: Taylor Swift used facial recognition technology at her live performances so that technicians running the system could then check those face scans against a private database of her stalkers. There is now big demand for serious security at live events the size of a Taylor Swift concert. There have been so many bombings and mass shootings at music concerts over the past year to even remember without Googling. Fear of being killed at a music concert is something people factor in to the decision to buy tickets and go to live events. The demand for security is real.

Read more of this story at Slashdot.


Newsbewertung

Weiterlesen

Geekbench für Windows - Cross-Plattform-Benchmark

IT Security Nachrichten vom 17.12.2018 um 13:54 Uhr | Quelle winfuture.de
Benchmark, Geekbench, Geekbench 4 Geekbench 4.3.2 ist ein beliebtes Benchmark-Tool, mit dem Sie die Leistungsfähigkeit von verschiedenen PC-Systemen und Mobilgeräten messen und miteinander vergleichen. Hierzu überprüft die Software vor allem den Prozessor, den RAM sowie die Grafikeinheit des zu testenden Gerätes. CPU und GPU testen Zwar genießt Geekbench vor allem unter Android-Nutzern ein hohes Ansehen als zuverlässige Benchmark-Anwendung, es gibt das Tool aber auch als Version für iOS, Mac OS, Linux und Windows-Systeme. (Weiter lesen)
Newsbewertung

Weiterlesen

Also und Mimecast erweitern die Zusammenarbeit

IT Security Nachrichten vom 17.12.2018 um 13:45 Uhr | Quelle google.com
... mittelständische Unternehmen des Herstellers führt, nimmt Also nun auch die Enterprise-Lösungen von Mimecast in sein IT-Security-Sortiment auf.
Newsbewertung

Weiterlesen

Who's watching you from an unmarked van while you shop in London? Cops with facial recog tech

IT Security Nachrichten vom 17.12.2018 um 13:42 Uhr | Quelle go.theregister.com

Great. Big Brother Watch claims tech had 100% fail rate since May

London cops have been slammed for using unmarked vans to test controversial and inaccurate automated facial recognition technology on Christmas shoppers.…


Newsbewertung

Weiterlesen

Leak Claims the Samsung Galaxy S10 Display Hole Could Be Tiny

IT Security Nachrichten vom 17.12.2018 um 13:36 Uhr | Quelle news.softpedia.com
Samsung’s Galaxy S10 is the next big launch in the smartphone world, and naturally, there are all kinds of photos making the rounds every now and then. But if a recent leak is anything to go by, there’s a good chance that Samsung is close to launching a design that looks surprisingly good, all thanks to a much smaller hole in the screen. At least, smaller than we originally anticipated. A protective film that was posted online by reliable leakster Ice Universe shows that the Galaxy S10 may come with a hole in the screen in the top right corner, and by the looks of things, this hole is a lot smaller than the one on the Galaxy A8s. While I can’t say that the Galaxy A8s design is ugly, a smaller hole in the screen is clearly a better choice, and it increases the available screen estate without eating up too much from the corner. However, it’s worth noting that this protective film seems to indi...
Newsbewertung

Weiterlesen

Leak Claims the Samsung Galaxy S10 Display Hole Could Be Tiny

IT Security Nachrichten vom 17.12.2018 um 13:36 Uhr | Quelle news.softpedia.com
Samsung’s Galaxy S10 is the next big launch in the smartphone world, and naturally, there are all kinds of photos making the rounds every now and then. But if a recent leak is anything to go by, there’s a good chance that Samsung is close to launching a design that looks surprisingly good, all thanks to a much smaller hole in the screen. At least, smaller than we originally anticipated. A protective film that was posted online by reliable leakster Ice Universe shows that the Galaxy S10 may come with a hole in the screen in the top right corner, and by the looks of things, this hole is a lot smaller than the one on the Galaxy A8s. While I can’t say that the Galaxy A8s design is ugly, a smaller hole in the screen is clearly a better choice, and it increases the available screen estate without eating up too much from the corner. However, it’s worth noting that this protective film seems to indi...
Newsbewertung

Weiterlesen

Sicherheitslücken: Schutzloses US-Raketenabwehrsystem

IT Security Nachrichten vom 17.12.2018 um 13:35 Uhr | Quelle golem.de
Das US-Raketenabwehrsystem ist nur unzureichend gegen Angriffe geschützt. Fehlende Antiviren-Software, mangelhaft umgesetzte Zwei-Faktor-Authentifizierung und eine seit 28 Jahren offene Sicherheitslücke sind nur einige der Schwachpunkte, die ein Untersuchungsbericht offenlegt. (Sicherheitslücke, Internet)
Newsbewertung

Weiterlesen

Sicherheitslücken: Schutzloses US-Raketenabwehrsystem

IT Security Nachrichten vom 17.12.2018 um 13:35 Uhr | Quelle golem.de
Das US-Raketenabwehrsystem ist nur unzureichend gegen Angriffe geschützt. Fehlende Antiviren-Software, mangelhaft umgesetzte Zwei-Faktor-Authentifizierung und eine seit 28 Jahren offene Sicherheitslücke sind nur einige der Schwachpunkte, die ein Untersuchungsbericht offenlegt. (Sicherheitslücke, Internet)
Newsbewertung

Weiterlesen

Systemsicherheit ist kein Hexenwerk«

IT Security Nachrichten vom 17.12.2018 um 13:33 Uhr | Quelle google.com
... dort mehrere Tage sämtliche Windows-Server und –Computer lahm. ... zu handeln«, sagt Götz Schartner, CEO des Cyber-Security-Unternehmens ...
Newsbewertung

Weiterlesen

Systemsicherheit ist kein Hexenwerk«

IT Security Nachrichten vom 17.12.2018 um 13:33 Uhr | Quelle google.com
... dort mehrere Tage sämtliche Windows-Server und –Computer lahm. ... zu handeln«, sagt Götz Schartner, CEO des Cyber-Security-Unternehmens ...
Newsbewertung

Weiterlesen

This Could Be the First Live Photo of the Samsung Galaxy S10

IT Security Nachrichten vom 17.12.2018 um 13:27 Uhr | Quelle news.softpedia.com
We’re only a few weeks away from the moment Samsung is expected to announce the new Galaxy S10, and naturally, alleged leaks keep making the headlines. This time, what we have here is a purported Galaxy S10 live photo that provides us with a closer look at the design of the device projected to see daylight in February. As reported by wccftech, the photo, which I recommend you to take with a healthy dose of skepticism, shows a hole in the display in the top right corner, indicating that this is where the front-facing camera will be embedded into the glass. Samsung will use Infinity O screens on the Galaxy S10, and this new design is based on holes drilled in the screens to allow front-facing parts to be embedded into the glass. A single front-facing camera By the looks of things, this particular model, if real, uses a single front-facing camera and not two as suggested by other recent leak...
Newsbewertung

Weiterlesen

This Could Be the First Live Photo of the Samsung Galaxy S10

IT Security Nachrichten vom 17.12.2018 um 13:27 Uhr | Quelle news.softpedia.com
We’re only a few weeks away from the moment Samsung is expected to announce the new Galaxy S10, and naturally, alleged leaks keep making the headlines. This time, what we have here is a purported Galaxy S10 live photo that provides us with a closer look at the design of the device projected to see daylight in February. As reported by wccftech, the photo, which I recommend you to take with a healthy dose of skepticism, shows a hole in the display in the top right corner, indicating that this is where the front-facing camera will be embedded into the glass. Samsung will use Infinity O screens on the Galaxy S10, and this new design is based on holes drilled in the screens to allow front-facing parts to be embedded into the glass. A single front-facing camera By the looks of things, this particular model, if real, uses a single front-facing camera and not two as suggested by other recent leak...
Newsbewertung

Weiterlesen

Malaysian Bank CIMB Denies Security Breach

IT Security Nachrichten vom 17.12.2018 um 13:25 Uhr | Quelle hackercombat.com

The Malaysian bank CIMB has denied security breach affecting its online banking portal, despite thousands of customers complaining of a hack. The Kuala Lumpur-headquartered CIMB, which is the fifth largest...

The post Malaysian Bank CIMB Denies Security Breach appeared first on .


Newsbewertung

Weiterlesen

Malaysian Bank CIMB Denies Security Breach

IT Security Nachrichten vom 17.12.2018 um 13:25 Uhr | Quelle hackercombat.com

The Malaysian bank CIMB has denied security breach affecting its online banking portal, despite thousands of customers complaining of a hack. The Kuala Lumpur-headquartered CIMB, which is the fifth largest...

The post Malaysian Bank CIMB Denies Security Breach appeared first on .


Newsbewertung

Weiterlesen

Office 365 Phishing Attack Using Fake Non-Delivery Notifications

IT Security Nachrichten vom 17.12.2018 um 13:23 Uhr | Quelle tripwire.com

A new phishing attack is using fake non-delivery notifications in an attempt to steal users’ Microsoft Office 365 credentials. SANS ISC Handler Xavier Mertens discovered the attack while reviewing data captured by his honeypots. The attack begins when a user receives a fake non-delivery notification from Microsoft such as the one shown below: For the […]… Read More

The post Office 365 Phishing Attack Using Fake Non-Delivery Notifications appeared first on The State of Security.


Newsbewertung

Weiterlesen

Office 365 Phishing Attack Using Fake Non-Delivery Notifications

IT Security Nachrichten vom 17.12.2018 um 13:23 Uhr | Quelle tripwire.com

A new phishing attack is using fake non-delivery notifications in an attempt to steal users’ Microsoft Office 365 credentials. SANS ISC Handler Xavier Mertens discovered the attack while reviewing data captured by his honeypots. The attack begins when a user receives a fake non-delivery notification from Microsoft such as the one shown below: For the […]… Read More

The post Office 365 Phishing Attack Using Fake Non-Delivery Notifications appeared first on The State of Security.


Newsbewertung

Weiterlesen

How I Hacked My Connected Vehicle, and Other Thoughts on Vehicle Cybersecurity

IT Security Nachrichten vom 17.12.2018 um 13:15 Uhr | Quelle feedproxy.google.com

Even if you're not into car hacks, you should still learn about the future of vehicle cybersecurity and the challenge it represents. But if you are, read on to learn how I hacked my connected car.

The post How I Hacked My Connected Vehicle, and Other Thoughts on Vehicle Cybersecurity appeared first on Security Intelligence.


Newsbewertung

Weiterlesen

The Worst Password in 2018 Is Still “123456”

IT Security Nachrichten vom 17.12.2018 um 13:14 Uhr | Quelle news.softpedia.com
If you thought that Internet users learned anything from the recent years when millions of accounts were hacked just because they were protected with poor passwords, I’m sorry to disappoint you. Recent statistics shared by SplashData reveal that the worst passwords in 2018 continue to be the typical “123456” and “password,” both of which have been at the top of the charts in the previous years too. They are followed by “123456789,” because you know, three extra digits make a password a lot harder to break, and “12345677” because no hacker would ever think their targets are using an 8-digit password. You can see the list of the world’s worst 25 passwords used in 2018 at the end of the article. Way too many users sticking with celebrities’ names One particular highlight is that “donald” has become one of the most common passwords this year because of you know who, a...
Newsbewertung

Weiterlesen

The Worst Password in 2018 Is Still “123456”

IT Security Nachrichten vom 17.12.2018 um 13:14 Uhr | Quelle news.softpedia.com
If you thought that Internet users learned anything from the recent years when millions of accounts were hacked just because they were protected with poor passwords, I’m sorry to disappoint you. Recent statistics shared by SplashData reveal that the worst passwords in 2018 continue to be the typical “123456” and “password,” both of which have been at the top of the charts in the previous years too. They are followed by “123456789,” because you know, three extra digits make a password a lot harder to break, and “12345677” because no hacker would ever think their targets are using an 8-digit password. You can see the list of the world’s worst 25 passwords used in 2018 at the end of the article. Way too many users sticking with celebrities’ names One particular highlight is that “donald” has become one of the most common passwords this year because of you know who, a...
Newsbewertung

Weiterlesen

R3Con1Z3R - A Lightweight Web Information Gathering Tool With An Intuitive Features (OSINT)

IT Security Nachrichten vom 17.12.2018 um 13:12 Uhr | Quelle feedproxy.google.com

R3con1z3r is a lightweight Web information gathering tool with an intuitive features written in python. it provides a powerful environment in which open source intelligence (OSINT) web-based footprinting can be conducted quickly and thoroughly.
Footprinting is the first phase of ethical hacking, its the collection of every possible information regarding the target. R3con1z3r is a passive reconnaissance tool with built-in functionalities which includes: HTTP header flag, Traceroute, Whois Footprinting, DNS information, Site on same server, Nmap port scanner, Reverse Target and hyperlinks on a webpage. The tool, after being provided with necessary inputs generates an output in HTML format.

Screenshots



Installation
r3con1z3r supports Python 2 and Python 3.
$ git clone https://github.com/abdulgaphy/r3con1z3r.git
$ cd r3con1z3r
$ pip install -r requirements.txt
Optional for Linux users
$ sudo chmod +x r3con1z3r.py

Moduldes
r3con1z3r depends only on the sys and the requests python modules.
Python 3: $ pip3 install -r requirements.txt
For Coloring on Windows: pip install win_unicode_console colorama

Usage
python3 r3con1z3r.py [domain.com]

Examples
  • To run on all Operating Systems (Linux, Windows, Mac OS X, Android e.t.c) i.e Python 2 environment
python r3con1z3r.py google.com
  • To run on python3 environment:
python3 r3con1z3r.py facebook.com
  • To run as executable Unix only
./r3con1z3r.py google.com



Newsbewertung

Weiterlesen

The most popular passwords of 2018 revealed. Are you using them?

IT Security Nachrichten vom 17.12.2018 um 12:52 Uhr | Quelle feedproxy.google.com

Beyond the usual suspects among the worst of passwords, a handful of notable – but similarly poor – choices make their debuts

The post The most popular passwords of 2018 revealed. Are you using them? appeared first on WeLiveSecurity


Newsbewertung

Weiterlesen

How to Check for Blind Spots in Your Security Program

IT Security Nachrichten vom 17.12.2018 um 12:40 Uhr | Quelle feedproxy.google.com

An effective security program does more than merely take on the appearance of cyber resilience. Learn how to look behind the curtain of your enterprise security.

The post How to Check for Blind Spots in Your Security Program appeared first on Security Intelligence.


Newsbewertung

Weiterlesen

Seitennavigation

Seite 6 von 3.117 Seiten (Bei Beitrag 175 - 210)
109.065x Beiträge in dieser Kategorie

Auf Seite 5 zurück | Nächste 7 Seite | Letzte Seite
[ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [6] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ]